Advanced Malware Analysis Using Responder Professional

HBGary

// july 24 - 27

USA 2010 Weekend Training Session //July 24-25

USA 2010 Weekday Training Session //July 26-27

Overview:

This hands-on course provides advanced coverage of HBGary Responder for live memory analysis, incident response, and binary forensics. Participants use Responder in real-life situations to obtain and analyze a variety of digital evidence from suspect machines, and extract binaries from memory images and analyze them graphically to quickly ascertain malicious capabilities and response strategies.

what to bring:

what you will get:

Trainers:

Greg Hoglund has been a pioneer in the area of software security. After writing one of the first network vulnerability scanners (installed in over half of all Fortune 500 companies), he created and documented the first Windows NT-based rootkit, founding www.rootkit.com (rootkit.com) in the process. Greg went on to co-found Cenzic, Inc. (cenzic.com) through which he orchestrated numerous innovations in the area of software fault injection. He holds two patents. Greg is a frequent speaker at Black Hat, RSA and other security conferences. He is co-author of Exploiting Online Games (Addison Wesley 2007) and Rootkits: Subverting the Windows Kernel (Addison Wesley 2005) and Exploiting Software: How to Break Code (Addison Wesley 2004).

Jim Richards brings 10 years of training development and delivery experience to HBGary. Jim spent 10 years at Hewlett-Packard in a variety of training roles from training content development to customer on-site training delivery. He led the worldwide training development efforts for the HP StorageWorks XP Disk Array family product introductions, along with managing the XP Disk Array training curriculum portfolio development for Field and Presales engineers.

Phil Wallisch has over 10 years of security industry experience. He has extensive experience in network based security solutions, Unix host security, and malware analysis. He started his career doing Unix system administration for various government contractors and designing layer three networks for Kaiser Permanente. He then spent five years at Neustar performing internal investigations, DDoS mitigation, threat research, and security operations. Most recently, Phil was a Senior Associate with PricewaterhouseCoopers in the security consulting practice where he performed penetration testing and incident response engagements. Currently Phil is Senior Security Engineer at HBGary where he delivers training, performs malware research, and supports customers.